๐Ÿ” CVE Alert

CVE-2026-48172

UNKNOWN 0.0
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

LiteSpeed User-End cPanel Plugin before 2.4.5 allows privilege escalation (possibly to root), as exploited in the wild in May 2026. LiteSpeed WHM Plugin (the parent plugin) is unaffected. Detection is best done via a command line of grep -rE "cpanel_jsonapi_func=redisAble" /var/cpanel/logs /usr/local/cpanel/logs/ 2>/dev/null in Bash. If you get no output, you have not been hit with exploitation of the vulnerability. If there is output, we recommend you examine the IP addresses in the list, determine if they are valid IP addresses, and if not, block them. To determine damage done, examine the system logs for use by the detected IP addresses. The issue is related to mishandling of Redis enable/disable features.

CWE CWE-266
Vendor litespeed technologies
Product cpanel plugin
Published May 21, 2026
Stay Ahead of the Next One

Get instant alerts for litespeed technologies cpanel plugin

Be the first to know when new unknown vulnerabilities affecting litespeed technologies cpanel plugin are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

LiteSpeed Technologies / cPanel Plugin
2.3 < 2.4.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
litespeedtech.com: https://www.litespeedtech.com/products/litespeed-web-server/control-panel-support/cpanel litespeedtech.com: https://www.litespeedtech.com/products/litespeed-web-server/control-panel-support/release-log